CryptographyDemystifying Aggregatable Distributed Key GenerationA novel component of Anoma is a Distributed Key Generation (DKG) scheme. George Gkitsas describes the concepts in DKG, starting with simple constructions, building up to the aggregatable DKG.
CryptographyDemystifying HybridDKG - A Distributed Key Generation SchemeHybridDKG is one of the latest distributed key generation schemes and can operate in an asynchronous environment, making it the most viable DKG scheme to use over the internet.
CryptographyDemystifying ZEXEZEXE is a ledger-based system that allows for the running of multiple applications atop the same ledger in a way that transactions reveal no information about the particular computations which are performed.
CryptographyDemystifying recursive zero-knowledge proofsRecursive zero-knowledge proofs are new cryptographic primitives relevant to the Anoma blockchain use case. In this article, we investigate the possible alternatives for verifying blockchain circuits efficiently. Our main interest is in estimating the efficiency of pairing-based constructions.
CryptographyFerveo Cryptography OverviewFerveo includes a custom-designed distributed key generator & custom-designed threshold decryption scheme intended to meet the performance & security requirements of the underlying consensus mechanism.
CryptographyHash Functions in PlonkupA quick overview of the proving system and show how to write a circuit that computes a small part of a common hash function that benefits greatly from the inclusion of lookups alongside arithmetic gates.
CryptographyA Vamp-IR's Guide to Arithmetic Circuits (and Perfectly Boiled Eggs)A primer on the concept of arithmetic circuits. We will take a look at what arithmetic circuits are, what they are used for, what tools are there for working with them, including the tools we develop here at Anoma, and what we can do with the circuits using these tools.
CryptographyZexe vs. VeriZexe vs. TaigaThe goal of this article is to understand the main architectural differences between Taiga and prior work such as Zexe and Verizexe, and the realm of posibilites, solutions and challenges that this new paradigm brings.
CryptographyHyperNova by HandBuilding on top of the techniques explored with SuperSpartan in part 1, the aim of this article is to unbundle the folding mechanism of the HyperNova protocol by writing it by hand. There is much wisdom hidden in the details.
CryptographySuperSpartan by HandThe goal of this article is to dive into the techniques behind the SuperSpartan's polynomial IOP, which uses the sum-check protocol to prove CCS instances, by writing the protocol explicitely for a specific example. This is part 1 of a two-post series. These techniques used in SuperSpartan are at the core of the HyperNova protocol that will be explored in part 2.